Report - gobro.exe

Malicious Library PE File PE32
ScreenShot
Created 2021.09.28 16:10 Machine s1_win7_x6401
Filename gobro.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
2.0
ZERO API file : malware
VT API (file) 21 detected (AIDetect, malware1, malicious, high confidence, Unsafe, Attribute, HighConfidence, Raccoon, Racealer, FileRepMalware, Generic ML PUA, Sabsik, Artemis, Generic@ML, RDML, dO0bZ8YYOTqxJDER3vU9VA, Static AI, Malicious PE, ZexaF, @J0@aOZXRanO)
md5 73fd366a5572fca7a981ed7a3f0b6150
sha256 43400e3c2f7a18186805d95fab6fdd0625f6d63f4e5229c358df79c8475312d2
ssdeep 98304:ZZR+mIv9K3wvbpM37cJ5Mm+EEpJ0zgC8L8Bj35/TSN:n2vdMLckmgpJgx3plS
imphash 5b9290431b366a1252cf05522cb28180
impfuzzy 12:vYK5KjHN3c2A+O6LOTlYKrKCKA4Q5kBZGoQtXJxZGb9AJcDfA5kLfP9m:vYK5K7K2ZOuCSKGXQ58QtXJHc9NDI5Q8
  Network IP location

Signature (5cnts)

Level Description
warning File has been identified by 21 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (3cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
t.me GB Telegram Messenger Inc 149.154.167.99 clean
149.154.167.99 GB Telegram Messenger Inc 149.154.167.99 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0xb23000 GetVersionExW
USER32.dll
 0xb23008 wsprintfW
GDI32.dll
 0xb23010 BitBlt
ADVAPI32.dll
 0xb23018 GetTokenInformation
SHELL32.dll
 0xb23020 SHGetFolderPathA
ole32.dll
 0xb23028 CoInitialize
USERENV.dll
 0xb23030 GetUserProfileDirectoryA
ktmw32.dll
 0xb23038 CreateTransaction
crypt.dll
 0xb23040 BCryptDecrypt
CRYPT32.dll
 0xb23048 CryptStringToBinaryA
SHLWAPI.dll
 0xb23050 StrCmpNW
WINHTTP.dll
 0xb23058 WinHttpSendRequest
gdiplus.dll
 0xb23060 GdiplusStartup
WTSAPI32.dll
 0xb23068 WTSSendMessageW
KERNEL32.dll
 0xb23070 VirtualQuery
USER32.dll
 0xb23078 GetProcessWindowStation
KERNEL32.dll
 0xb23080 LocalAlloc
 0xb23084 LocalFree
 0xb23088 GetModuleFileNameW
 0xb2308c GetProcessAffinityMask
 0xb23090 SetProcessAffinityMask
 0xb23094 SetThreadAffinityMask
 0xb23098 Sleep
 0xb2309c ExitProcess
 0xb230a0 FreeLibrary
 0xb230a4 LoadLibraryA
 0xb230a8 GetModuleHandleA
 0xb230ac GetProcAddress
USER32.dll
 0xb230b4 GetProcessWindowStation
 0xb230b8 GetUserObjectInformationW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure